Page 5 of 35 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team wpForo Forum plugin <= 2.0.5 on WordPress leading to topic deletion. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento gVectors Team wpForo Forum de Wordpress en versiones &lt;= 2.0.5, lo que lleva a la eliminación del tema. The wpForo Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation on various AJAX actions. This makes it possible for unauthenticated attackers to invoke the associated functions (leading to post deletion for example), via forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/wpforo/wordpress-wpforo-forum-plugin-2-0-5-cross-site-request-forgery-csrf-vulnerability-2?_s_id=cve https://wordpress.org/plugins/wpforo • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in gVectors Team wpForo Forum plugin <= 2.0.5 at WordPress. Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en el plugin wpForo Forum de gVectors Team versiones anteriores a 2.0.5 incluyéndola, en WordPress The wpForo Forum plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers to execute that function, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/wpforo/wordpress-wpforo-forum-plugin-2-0-5-cross-site-request-forgery-csrf-vulnerability/_s_id=cve https://wordpress.org/plugins/wpforo/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Sensitive information disclosure discovered in wpDiscuz WordPress plugin (versions <= 7.3.11). Se ha detectado una divulgación de información confidencial en el plugin wpDiscuz de WordPress (versiones anteriores a 7.3.11 incluyéndola) • https://patchstack.com/database/vulnerability/wpdiscuz/wordpress-wpdiscuz-plugin-7-3-11-sensitive-information-disclosure https://wordpress.org/plugins/wpdiscuz/#developers • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

The wpDiscuz WordPress plugin before 7.3.4 does check for CSRF when adding, editing and deleting comments, which could allow attacker to make logged in users such as admin edit and delete arbitrary comment, or the user who made the comment to edit it via a CSRF attack. Attackers could also make logged in users post arbitrary comment. El plugin wpDiscuz de WordPress versiones anteriores a 7.3.4, no comprueba la existencia de CSRF cuando se añaden, editan y eliminan comentarios, lo que podría permitir a un atacante hacer que usuarios registrados, como el administrador, editen y eliminen un comentario arbitrario, o que el usuario que hizo el comentario lo edite por medio de un ataque CSRF. Los atacantes también podrían hacer que usuarios que han iniciado sesión publiquen comentarios arbitrarios • https://wpscan.com/vulnerability/2746101e-e993-42b9-bd6f-dfd5544fa3fe • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Comments – wpDiscuz WordPress plugin through 7.3.0 does not properly sanitise or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. El plugin Comments - wpDiscuz de WordPress versiones hasta 7.3.0, no sanea o escapa adecuadamente de los mensajes Follow y Unfollow antes de mostrarlos en la página, que podría permitir a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting Almacenados incluso cuando la capacidad unfiltered_html está deshabilitada The Comments - wpDiscuz WordPress plugin through 7.3.0 does not properly sanitize or escape the Follow and Unfollow messages before outputting them in the page, which could allow high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. • https://wpscan.com/vulnerability/f51a350c-c46d-4d52-b787-762283625d0b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •